CVE-2022-38670 In soundrecorder service, there is a missing permission check
There is also a race condition in handling of screenshots when recording. There is a blocking call in the service that might lead to a high-cpu load. This can be mitigated by lowering the sampling rate. Last but not least there is a vulnerability in the handling of external input devices. It is possible to open those devices from other applications with no restrictions.
How to get the Kubernetes version
To get the Kubernetes version, you can use the following command:
$ kubectl version
If that command returns a message like "Not found", then it means that the Kubernetes version is not installed in your system. You need to install Kubernetes before using kubectl which can be done by running the following commands:
$ sudo yum update && sudo yum install -y kubernetes-x86_64 && sudo systemctl enable --now kubelet && sudo systemctl start --now kubelet
Once you have successfully installed Kubernetes and have started the Kubernetes service, you can use the following command to get its version:
What to do if you are running Ubuntu 18.04 (Bionic Beaver)
If you are running Ubuntu 18.04 (Bionic Beaver) then you should update it to the latest release.
How to identify a vulnerable device?
When looking for a vulnerable device it is important to start with the basics. At first a vulnerability check can be done on any UNIX-like operating system that uses X Window System. A simple command like xdpyinfo and xwininfo provides basic information about the display and window manager. If you don’t see any errors in the output then chances are your device isn’t vulnerable.
If you do see an error it is important to look at the X server log file (/var/log/Xorg.0.log) or xorg logs, this will provide more information about what might have happened, including how the attacker got access to the device.
Timeline
Published on: 10/14/2022 19:15:00 UTC
Last modified on: 10/18/2022 19:29:00 UTC